Last month, eight sites at once well-known anti-virus solutions avast!  Were defaces:

http://2.bp.blogspot.com/_eY5lQb30XpY/S4Ac8e9asZI/AAAAAAAAAuk/5dXk9I3GQPk/s320/deface_avast.jpg

http://www.avast.co.za/ (mirror; date: 2010-01-22 15:06:28)
http://awast.org/ (mirror; date: 2010-02-18 18:57:27)
http://www.avast.de/ (mirror; date: 2010-02-18 18:58:01)
http://shop.avast.de/ (mirror; date: 2010-02-18 18:58:24)
http://www2.avast.de/ (mirror; date: 2010-02-18 18:59:51)
http://partner.avast.de/ (mirror; date: 2010-02-18 19:03:59)
http://demoshop.avast.de/ (mirror; date: 2010-02-18 19:03:14)
http://forum.avast.de/ (mirror; date: 2010-02-18 19:01:33)

Breaking these sites was done by a group of hackers “HcJ & Cyb3R-1sT”, on account of which a successful break sites and other equally popular antivirus vendors:

ESET

https: / / www.eset-antivirus.de/ (mirror; date: 2009-12-21 00:35:55)
https: / / www.datsec.de/ (mirror; date: 2009-12-20 22:50:05)
https: / / www.esetantivirus.de/ (mirror; date: 2009-12-21 00:32:02)
http://www.eset.de/ (mirror; date: 2009-12-20 22:47:52)
https: / / www.esetsoftware.de/ (mirror; date: 2009-12-18 00:22:21)
https: / / www.nod32.de/ (mirror; date: 2009-12-18 00:21:24)
http://getnod32.com/ (mirror; date: 2009-12-12 00:47:18)
http://nod-32.eu/ (mirror; date: 2009-11-30 01:48:52)
http://partners.nod32.bg/ (mirror; date: 2009-10-04 01:52:36)

Panda Security

http://duvidas.pandasecurity.com.br/ (mirror; date: 2009-12-13 11:43:54)
http://download.pandasecurity.com.br/ (mirror; date: 2009-12-10 20:56:17)
http://press.pandasecurity.com.br/ (mirror; date: 2009-12-10 20:56:38)
http://intranet.pandasecurity.com.br/ (mirror; date: 2009-12-10 20:57:11)

F-Secure

http://ativacao.f-secure.com.br/ (mirror; date: 2009-12-23 14:21:20)
http://fsecure.com.br/ (mirror; date: 2009-12-23 14:48:51)
http://f-secure.com.br/ (mirror; date: 2009-12-13 21:28:12)

bitdefender

http://www.bitdefenderthailand.com/ (mirror; date: 2009-12-26 02:45:15)
http://bitnet.com.hr/ (mirror; date: 2009-12-09 23:26:53)

Avast (additionally:))

http://avast.se/ (mirror; date: 2009-12-10 15:38:19)

After walking on mirrors defaces start involuntarily thinking, and whether it is worth trusting distribution antivirus solutions have just downloaded from the official site of the manufacturer? But back to the topic of fasting.

It was interesting to know, the adequacy (and efficiency) of protective measures taken after the incidents occurred on the sites of avast!.So, armed with the most advanced hacker tool called a browser, I made the transition to the site www.avast.co.za (first in the list) and …

This time is more than sufficient to detect and eliminate the most dangerous and common vulnerabilities Web.  But as we see not all are ready to learn from the first time …

Source: www.zone-h.org

Explore More

Rooting webhost

r00ting a webhost Introduction: Well taking over a host isnt as easy as you may think. There is a fairly big process involved and a lot of fidiling around. Below

Critical SQL Injection in http://www.ecovisionjournal.com – Weekly Journal

Security Researcher $@T0R! reported another Critical SQL Injection in http://www.ecovisionjournal.com – Weekly Journal SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer

Hacking

Hacking is an unauthorized access of computers and networks. It is the act of piercing computer systems gaining knowledge of the systems and the learning of how it works. The